According to a paper recently published by Eric Johanson of the Shmoo Group, users on most Mozilla-based browsers (Firefox 1.0, Camino .8.5, Mozilla 1.6, etc), Safari 1.2.5, Opera 7.54, Omniweb 5 are victim to a complex International Domain Name [IDN] spoof.

This new attack allows an attacker/phisher to spoof the domain/URLs of businesses. Every recent gecko/khtml based browser implements IDN (which is just about every browser except for Internet Explorer). The Smoo Group have created a proof of concept where the links are directed at "http://www.pаypal.com/", which the browsers punycode handlers render as http://www.xn--pypal-4ve.com.

According to the group there is however an easy to way to detect you're under a spoof attack, cut & paste the url you are accessing into notepad or some othertool (under OSX, paste into a terminal window) which will allow you to view what character set/pagecode the string is in. You can also view the details of the SSL cert etc.

You can disable IDN support in Mozilla products by setting 'network.enableIDN' to false. There is no known workaround for Opera or Safari. Vendor responses have been varied with VeriSign and Apple failing to respond but Opera believing they have correctly implemented IDN, and will not be making any changes (oops). Mozilla are currently working on finding a good long-term solution. The company provided a clear workaround for disabling IDN temporarily until it can better address the issue.

This latest exploit will provide spammers with a way to trick FireFox, Opera and Safari users into thinking they're on a certain website. Commonly known as Phishing this latest attack by spammers and hackers is frighteningly common.

Update: Many users are reporting the config change in Firefox does not work, currently there is no fix for Firefox.

makkan77 wrote:ahh great..'cause all those half 'n half fixes seemed well no good..

Actually, it's not entirely fair to blame the browsers. A big part of the problem is with BIND and crappy dns. If you'd like a discussion of poisoned ip's and the failings of BIND, look for Jonathan deBoyne Pollard's writings on the subject. Phishing *shouldn't* be so easy .....

hamei wrote:Actually, it's not entirely fair to blame the browsers. A big part of the problem is with BIND and crappy dns. If you'd like a discussion of poisoned ip's and the failings of BIND, look for Jonathan deBoyne Pollard's writings on the subject. Phishing *shouldn't* be so easy .....

Maybe, but for once, this doesn't seem to affect IE...

What's amazing with Firefox is the 1984 style of rewriting the history:
"Version X is the most secure web browser in the galaxy" are we told... Until X.01 comes out and then you get a message "Don't use version X, there are so many security holes".

Every time MS releases a security patch, it's a deluge of derogatory comments about how shitty IE is. Yet, when the firefox guys do the same thing, it is presented as a highlight of how great open source is...

Don't get me wrong, firefox has tons of great ideas in it, and obviously far less exploits for now (but for how long, and what kind of damage can skilled programmers do if they have access to a source code?). I find the whole situation rather ironic... It's a competition of marketing spewer, from both sides of the fence...

Now, I am just wondering how much of this "don't use version X" is a way of getting more downloads out of firefox to enforce the "firefox is taking over" propaganda...